Access Control

Only available on StudyMode
  • Download(s) : 273
  • Published : May 26, 2013
Open Document
Text Preview
|
Access Control|
Course Project – SEC330|
|
Kristen E. Mosuch|
2/10/2013|

Table of Contents:
Introduction………………………………………………………………………………………………………………………………Page 2 Risks and Threats Overview………………………………………………………………………………………………………Page 2 Risks Associated with Access Control………………………………………………………………………………………..Page 3 Methods of Access Control……………………………………………………………………………………………………….Page 4 Government Regulations…………………………………………………………………………………………………………..Page 7 Conclusion…………………………………………………………………………………………………………………………………Page 8 Bibliography………………………………………………………………………………………………………………………………Page 10

Access Control
*
Introduction:
Physical security breaches can be detrimental to any company. Adequate access control is imperative to insure the protection of data, assets and employees. In a post 9/11 America, the need for higher physical security standards and more stringent access control systems remains a critical piece of corporate security plans. Access control systems not only keep out unauthorized individuals, but prevent unauthorized access to data and equipment, and help deter and prevent unauthorized disclosure of information. “In traditional physical security, locks, security alarms, access controls, and surveillance video define the primary hardware systems.” (Martin & Bakhto). This paper examines the significance of physical access controls and their purpose and place in the corporate security program. Risks and Threats Overview:

There are many risks and threats associated with corporations and the protection of their assets and data. Some of these threats include, terrorism (both domestic and foreign), cyber threats, armed intruders, espionage, bomb threats and data spills. Any one of these threats, if allowed to become a reality, could easily be the downfall of a corporation, depending on the severity of the threat. “Physical security breaches can result in more issues for an organization than a worm attack. Loss of data, temporary loss of availability by shutting systems down, or longer term loss of availability by bomb or arson are all things to consider when implementing physical security.” (Giannoulis & Northcutt, 2007)

The safety and security of a corporation’s employees is imperative for proper function, success, and productivity. Corporations have a duty to make sure all measures are taken to ensure the safety of the employees, whether it’s protection from outside intruders, or safeguarding from information spills or data breaches. Risks Associated with Access Control:

In 2012, there was at least one armed intruder incident per month in the United States. This includes disgruntled employees seeking revenge, protestors, mentally ill family members seeking vengeance, and random acts of violence. Armed intruders have become, unfortunately, an all too common occurrence in the United States. Corporations have started incorporating armed intruder training into their corporate security plans, to make sure employees are aware of what to do in the event they are involved in a workplace violence incident. Internal and external thefts are two of the biggest threats to a company’s security. Statistics show that a company is more likely to have data or assets stolen by an internal employee rather than someone from the outside. Thefts can occur both physically and logically, meaning the property stolen can be equipment or information. Since many companies depend on proprietary information to conduct business, the unauthorized disclosure of that information could prove detrimental to a company’s bottom line. Corporate espionage has existed since companies have existed. Over the years, many people have been caught revealing government secrets or disclosing proprietary information to competing companies in return for financial gain. These spies use many methods to gain access to the information they wish to sell and many of these methods are new technologies that have just...
tracking img